Skip to content

Now capable of storing 96 TB of network and application traffic for analysis in a single chassis, the GigaStor Expandable scales to over a petabyte and beyond with additional units. It is the highest-capacity retrospective network analysis solution on the market today.*

To further put the size of a petabyte into perspective – if the average smartphone camera photo is 3MB in size and the average printed photo is 8.5 inches wide, then the assembled petabyte of photos placed side by side would be over 48,000 miles long, almost long enough to wrap around the equator twice.
Source: ComputerWeekly.com

Form Factor Deployment Capacity Networks Rack Size

Expandable

Data Center
Server Access Layer
Long-Term Retention

Data Center
Server Access Layer
Long-Term Retention

1 Gb, 10 Gb & 40 Gb 5U

 

GigaStor Expandable capacities can begin at 96 TB (increasing by 96 TB increments) to 288 TB, thereafter growing in 288 TB amounts to 576 TB, 864 TB, and over a petabyte of packet capture storage. The Expandable product line offers in-the-field scalability to meet growing performance monitoring needs on gigabit, 10 Gb, and 40 Gb links.

GigaStor provides network forensics and data retention solutions to network teams for retrospective network analysis and troubleshooting. Using GigaStor’s analytics, users navigate to the exact moment a problem occurred, view packet-level details around the event, and resolve the issue. GigaStor, along with other Observer Platform solutions, saves significant time troubleshooting and eliminates having to recreate the performance problem.

*Compared to primary vendors Netscout, Riverbed, and Fluke, Network Instruments’ GigaStor provides the largest long-term packet capture and storage capacity in a single appliance.

Thanks to Network Instruments for the article. 

Related Posts

Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Bypass Switches: Ensuring Network Uptime and Security in High-Stakes Environments

Modern Bypass Switches also offer granular control and flexible configurations, allowing administrators to choose whether the device should fail open…
Traceable Time as a Service - The Evolution of Precision Time

Traceable Time as a Service - The Evolution of Precision Time

Time is more than just a measure of seconds. It underpins the financial markets, telecommunications, cybersecurity, and every sector that…
Back in time packet capture and forensics with VIAVI Obeserver as a key component in a Zero Trust Network implementation

Back in time packet capture and forensics with VIAVI Obeserver as a key component in a Zero Trust Network implementation

Explore how packet capture and forensic analysis empower Zero Trust security implementations, ensuring network visibility and compliance.
TCXO, OCXO and Rubidium -- understanding oscillators and the role they play in precision time keeping

TCXO, OCXO and Rubidium -- understanding oscillators and the role they play in precision time keeping

Explore the differences between TCXO, OCXO, and Rubidium oscillators in precision timekeeping for telecommunications and industrial applications.
Mission-Critical Timing: The Transition from Spectracom to Safran

Mission-Critical Timing: The Transition from Spectracom to Safran

When it comes to critical operations whether in defense, public safety, telecommunications, or infrastructure, accurate, reliable time synchronization is non-negotiable.…